skip to Main Content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Hospitals Respond to Influx of Ransomware Attacks by Increasing Budgets

    Hospital Response Ransomware Attack

    The ransomware onslaught on hospitals and healthcare organizations is being seen as the catalyst for boards to shift operational priorities and put more focus on cybersecurity initiatives.

    In a recent interview with Healthcare IT News, Steve Smerz, Halo Health CISO, made it clear why hospitals are under attack. His statement was the following, “Becoming a ransomware target involves three main factors – typically money, a critical use-case and an access point. And health systems have all three.” We’ve seen the result of this in 2021, a 350% increase in ransomware attacks on healthcare organizations, an average of over 600 attacks weekly, and entire hospitals shutdown as a result.

    This growth in attacks targeting healthcare have caused a change in focus. According to Smerz, “It’s up to IT leaders and the health systems they support to keep pace, which of course is a challenge even under the best of circumstances. Security is a risk no one is willing to take.”

    According to Smerz, the primary “access point” hospitals need to be concerned about is the human element, stating that “health systems are remarkable examples of people working together, quickly, under busy and occasionally difficult scenarios. That adds up to a chance for a staff member to click on an email that looks real or to fall for sophisticated phishing efforts. The result is that every hospital or health system is potentially at risk for a ransomware attack. No one should assume it won’t happen to us.”

    Of course, this is all about employee vigilance. You can’t ask a nurse to stop their work and focus on whether an email is malicious or not; it’s something that needs to be innate – which can be taught over time through continual Security Awareness Training.

    Attacks on healthcare aren’t going to stop anytime soon. So putting a layered defense in depth strategy together that includes the user as part of the defense is going to be critical.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RansIm-Monitor3

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 21 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    close

    Sign Up to the TIO Intel Alerts!

    Back To Top